The Z notation: a reference manual
The Z notation: a reference manual
Practical Unix and Internet security (2nd ed.)
Practical Unix and Internet security (2nd ed.)
Lattice-Based Access Control Models
Computer
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Conduit cascades and secure synchronization
Proceedings of the 2000 workshop on New security paradigms
Computational paradigms and protection
Proceedings of the 2001 workshop on New security paradigms
Mathematical Models of Computer Security
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Direct static enforcement of high-level security policies
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
On mutually exclusive roles and separation-of-duty
ACM Transactions on Information and System Security (TISSEC)
Unified support for heterogeneous security policies in distributed systems
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Generalized access control of synchronous communication
Proceedings of the ACM/IFIP/USENIX 2006 International Conference on Middleware
Configuring storage-area networks using mandatory security
Journal of Computer Security
Believing the Integrity of a System
Electronic Notes in Theoretical Computer Science (ENTCS)
Regularity-based trust in cyberspace
iTrust'03 Proceedings of the 1st international conference on Trust management
Generalized access control of synchronous communication
Middleware'06 Proceedings of the 7th ACM/IFIP/USENIX international conference on Middleware
Hi-index | 0.00 |